Search Results for ""
251 - 260 of 655 for EXCEPTION -- No Appropriate CodeSearch Results
The science of breaking codes, which is one part of cryptology.
Cryptology is the science of making and breaking secure codes. It consists of cryptography, the science of making secure codes, and cryptanalysis, the science of breaking ...
The 3-node tournament (and directed graph) illustrated above (Harary 1994, p. 205).
The cylindrical parts of a system of real algebraic equations and inequalities in variables {x_1,...,x_n} are the terms f_1 <= x_1<=g_1 (1) f_2(x_1) <= x_2<=g_2(x_1) (2) | ...
Let A be any algebra over a field F, and define a derivation of A as a linear operator D on A satisfying (xy)D=(xD)y+x(yD) for all x,y in A. Then the set D(A) of all ...
The curve d(u) in the ruled surface parameterization x(u,v)=b(u)+vd(u).
A generalization by Kronecker of Kummer's theory of prime ideal factors. A divisor on a full subcategory C of mod(A) is an additive mapping chi on C with values in a ...
A term in social choice theory meaning each alternative receives equal weight for a single vote.
The second-order ordinary differential equation y^('')+[(alphaeta)/(1+eta)+(betaeta)/((1+eta)^2)+gamma]y=0, where eta=e^(deltax).
The set of all edge automorphisms of G, denoted Aut^*(G). Let L(G) be the line graph of a graph G. Then the edge automorphism group Aut^*(G) is isomorphic to Aut(L(G)), ...
...
View search results from all Wolfram sites (36503 matches)

